Next, go to www.grc.com and click on ShieldsUp, next screen scroll down to Hot Spots, and click on ShieldsUp again, next screen click on Proceed, next screen click on All Service Ports and let it check the ports, gives an ok result, the ports are neon green, and gives you this veredict:

"Your system has achieved a perfect "TruStealth" rating. Not a single packet â€” solicited or otherwise â€” was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet. Some questionable personal security systems expose their users by attempting to "counter-probe the prober", thus revealing themselves. But your system wisely remained silent in every way. Very nice."

Re: HOWTO: Post-Installation Configurations

I don't know what I did here, but after clicking on the picture, I was taken to a "Roblox" site at some point. I'm not sure how it happened though.

I have been Devuanated, and my practice in the art of Devuanism shall continue until my Devuanization is complete. Until then, I will strive to continue in my understanding of Devuanchology, Devuanprocity, and Devuanivity.

Re: HOWTO: Post-Installation Configurations

UFW (Uncomplicated Firewall)

Does Devuan Jessie have any default firewall ? I did not install any and I got this result in test:

Your system has achieved a perfect "TruStealth" rating. Not a single packet — solicited or otherwise — was received from your system as a result of our security probing tests. Your system ignored and refused to reply to repeated Pings (ICMP Echo Requests). From the standpoint of the passing probes of any hacker, this machine does not exist on the Internet.

Re: HOWTO: Post-Installation Configurations

There is no default firewall front-end installed in debian or devuan. There is iptables, but no rules are in place. If you install some services that listen for connections, then you will have open ports. (examples: openssh-server, mysql-server, apache2, samba)

If you're behind a router, the router is being scanned, and unless you set up port-forwarding in the router, the outside world can't see the open ports on your computer.

Re: HOWTO: Post-Installation Configurations

Re: HOWTO: Post-Installation Configurations

@greenjeans wrote:

Never understood the use of sudo, on a list of "worst ideas ever for linux" it ranks right up there with dconf and systemd IMO.

'well - as I understand it - Linux is a multi-user system - so someone has to be the boss/adminNow it is true that most linux downloads are most likely for single user/desktops - so root/sudo becomes a grey area.: IMONot sure what the answer is - there is a lot of debate about it'I am not taking a stand on it

Re: HOWTO: Post-Installation Configurations

Re: HOWTO: Post-Installation Configurations

sudo history is a bit older than linux not to mention ubuntu. sudo development is/was maintained by OBSD (although OBSD uses mainly doas rather than sudo nowdays) however system is as secure as one make it.